Skip to content
11 · Onboarding · Manufacturers

Onboarding Manufacturers

Andi Lamprecht Andi Lamprecht ·· 7 min read· Draft
Lifecycle event. A manufacturer org cannot mint ATOMx-compatible aircraft until ATOMx has issued it a Manufacturer Intermediate CA. This page documents the onboarding gate. The certificate substrate is in PKI and Chains of Trust; the aircraft-side hardware model is in Aircraft Hardware Identity.

1. Why Manufacturer Onboarding Exists

Aircraft identity in ATOMx is rooted in the OEM. An aircraft proves who it is by presenting a certificate signed by the manufacturer’s intermediate CA, which itself chains to the ATOMx Root. If any OEM could obtain that intermediate CA without diligence, every aircraft they minted would become a trust anchor for the platform. Onboarding gates the issuance of that intermediate CA.

2. The Five Onboarding Gates

#GateWhat It Establishes
1Eligibility reviewCorporate identity, regulatory standing, export-compliance posture, supply-chain attestation
2Technical conformanceThe OEM demonstrates a manufacturing line that provisions a hardware secure element on each airframe and binds an OEM-signed certificate to it
3Key ceremonyThe OEM private key for its intermediate CA is generated inside the OEM’s own HSM and never leaves it. The OEM produces a CSR; ATOMx signs it using the Root HSM under dual control. The OEM never sees the Root private key.
4Manufacturing SDKOEM receives the firmware integration kit (broadcast format, capsule verification routines, attestation reporting interface)
5Batch attestation contractOEM commits to submitting signed manufacturing batch records to ATOMx — which serial numbers were minted, when, with which firmware version

3. Key Ceremony Sequence

    sequenceDiagram
    autonumber
    participant OEM
    participant ATOMx
    participant HSMa as ATOMx Root HSM
    participant HSMo as OEM HSM
    OEM->>ATOMx: Apply for manufacturer credential
    ATOMx->>OEM: Eligibility + conformance review
    OEM->>HSMo: Generate OEM intermediate keypair
    HSMo-->>OEM: CSR
    OEM->>ATOMx: Submit CSR + attestation
    ATOMx->>HSMa: Sign OEM Intermediate CA cert under Root
    HSMa-->>ATOMx: Signed cert
    ATOMx-->>OEM: Issue OEM Intermediate CA cert + SDK
    Note over OEM,ATOMx: OEM may now mint per-aircraft certs at the factory
  

4. The Two Independent Chains

Once onboarded, the OEM operates one of two cert chains for every aircraft it ships. The other (TPM chip provenance) is operated by the TPM chip manufacturer, independently. Both chains must be present and cross-referenced for an aircraft to verify. See Aircraft Hardware Identity §2.

5. Specifications, Compliance, and Commercial Terms

5.1 HSM Requirements

PropertyRequirement
FIPS 140-3 levelLevel 3 minimum for OEM Intermediate CA HSM; Level 4 acceptable
Key generationAll key material generated inside the HSM; never exportable in plaintext
Ceremony controlDual-control / m-of-n quorum on the OEM side, recorded and witnessed
Acceptable vendorsThales, Entrust, AWS CloudHSM, Azure Dedicated HSM, YubiHSM 2 (FIPS), or equivalent — ATOMx maintains a current accepted-vendor list
AttestationOEM provides a vendor attestation that the keys were generated on a compliant HSM

5.2 Compliance Posture

StandardApplies ToSource
NDAA Section 889Federal customer-facing OEMsBill of materials attestation; covered foreign-origin components excluded
TAAFederal procurementCountry-of-origin attestation
CMMCDefense-industrial-base OEMsLevel 2 minimum for handling controlled unclassified; Level 3 for select programs
ITAR / EARDefense / dual-use platformsExport-classification declaration; ATOMx onboarding does not transfer ITAR-controlled material
Blue UAS / Trusted ComponentFederal-program OEMsListing and component-set attestation

5.3 Commercial and Contractual Terms

ATOMx does not publish standard pricing here — those terms are negotiated per OEM. Onboarding contracts cover:

  • Per-OEM onboarding fee plus annual maintenance
  • HSM cost borne by the OEM (ATOMx does not host the OEM intermediate)
  • SDK license terms and update cadence
  • Liability allocation for fraudulent or non-conforming aircraft minted under the OEM CA
  • Indemnity limits and incident-response commitments
  • Data-handling terms for batch attestation records

6. Ongoing Obligations

After onboarding, the OEM:

  • Submits signed batch attestations for each manufacturing run
  • Maintains a CRL for its issued aircraft certificates (or migrates to short-lived certs renewed at routine check-in)
  • Participates in scheduled Manufacturer CA rotations (target: 5-year rotation with overlapping validity)
  • Reports security events affecting its assembly line, firmware, or HSM

7. Incident Response and De-Listing

7.1 OEM Security Incident

If an OEM detects a security incident affecting its signing infrastructure, manufacturing line, or firmware integrity, it must notify ATOMx within a contractually-defined window (typically 24 hours). ATOMx may:

  • Pause new aircraft minting under that OEM until investigation completes
  • Trigger emergency rotation of the OEM Intermediate CA
  • Issue a CRL update covering affected aircraft serials
  • Coordinate with operators flying affected airframes

7.2 De-Listing

An OEM may be de-listed for cause — repeated batch-attestation discrepancies, failure to remediate a security event, loss of regulatory standing, NDAA violation, or other contractually-defined trigger. De-listing has cascading effects:

OutcomeMechanism
New aircraft minting haltedOEM Intermediate CA marked end-of-life
Already-minted aircraft remain valid until expiry or revocationExisting flights are not grounded mid-operation
Operator notificationAffected operators receive remediation timelines
Mass revocation (worst case)If de-listing reflects compromised signing keys, all aircraft signed by that OEM Intermediate are revoked via CRL update; operators must re-onboard with a different OEM

De-listing is rare; the procedural process targets months, not days, to allow operators to migrate.

7.3 Mergers, Acquisitions, and Divestitures

OEM corporate change events do not automatically transfer the Manufacturer Intermediate CA. The acquiring entity must complete a streamlined re-eligibility review and either:

  • Continue operating the existing OEM Intermediate CA under the same identity and key material (preferred)
  • Replace it with a new Intermediate CA under the new entity’s identity, with a defined cross-signing window for in-field aircraft

Divestitures (one OEM splits into two) require a separate Manufacturer Intermediate CA per resulting entity, with clear ownership of the original aircraft fleet.

8. Cross-References

Implementation Readiness — Open Questions

Each entry below identifies a decision not yet locked. Items marked (ADR) should be formalized as an Architecture Decision Record before implementation begins. Items marked (blocking) must be resolved before the relevant feature can be built.

#QuestionOwnerADR?Blocking?
1Which language(s) and target platforms will the Manufacturing SDK support (C/C++, Rust, Go), and what is the public API surface for key-injection, attestation, and provisioning calls?engineeringADR — “Manufacturing SDK Language & API Surface”Yes
2What is the OEM Portal architecture (tenant isolation model, auth via Okta federation vs. external IdP, hosting boundary for ITAR-restricted OEMs)?engineering + productADR — “OEM Portal Architecture & Tenant Isolation”Yes
3What is the batch-attestation manifest file format (schema, signing envelope, COSE vs. JWS), and what is the required submission cadence (per-batch, daily, on-completion)?engineeringADR — “Batch Attestation Manifest Format & Submission Cadence”Yes
4What is the signed-firmware-update protocol, including PCR roll-forward semantics, rollback protection, and recovery on failed measurement?engineeringADR — “Signed Firmware Update & PCR Roll-Forward Protocol”Yes
5How is the OEM CRL distributed and refreshed (OCSP stapling, CRLite, pull cadence, offline propagation for disconnected fleets)?engineeringADR — “OEM Certificate Revocation Distribution”Yes
6What are the OEM key-ceremony specifics: M-of-N quorum thresholds on the OEM side, ceremony-script template, witness/video retention policy, and FIPS 140-3 HSM model approval list?engineering + legalADR — “OEM Key Ceremony & Witness Retention Standard”Yes
7What is the eligibility-review rubric — explicit pass/fail criteria, scoring weights, and appeal mechanism for NDAA/CMMC/ITAR posture assessment?product + legalNoYes
8What are the commercial terms: who pays for the ATOMx-supplied HSM and integration engineering time, partner-program tiering (Bronze/Silver/Gold), and revenue-share or per-unit licensing model?business-developmentNoNo
9What are the audit-rights contract terms, indemnity caps, insurance minimums (cyber + product liability), and the legal process for de-listing (notice period, cure window, dispute resolution forum)?legal + business-developmentNoYes
10What is the OEM Portal SLA (uptime, support response times, incident-response RACI between ATOMx SOC and OEM), and how is M&A succession handled (assignment clause, re-attestation trigger, key-material transfer procedure)?product + legalADR — “Incident Response RACI & M&A Succession”No
Last updated on